Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.11889/8417
DC FieldValueLanguage
dc.contributor.authorMafarja, Majdien_US
dc.contributor.authorHeidari, Ali Asgharen_US
dc.contributor.authorHabib, Mariaen_US
dc.contributor.authorFaris, Hossamen_US
dc.contributor.authorThaher, Thaeren_US
dc.contributor.authorAljarah, Ibrahimen_US
dc.date.accessioned2024-01-08T09:58:51Z-
dc.date.available2024-01-08T09:58:51Z-
dc.date.issued2020-
dc.identifier.urihttp://hdl.handle.net/20.500.11889/8417-
dc.description.abstractSmart connected appliances expand the boundaries of the conventional Internet into the new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several fields as in transportation, industry, smart homes, and cities. However, one of the critical issues is how to protect IoT environments and prevent intrusions. Attacks detection systems aim to identify malicious patterns and threats that cannot be detected by traditional security countermeasures. In literature, feature selection or dimensionality reduction has been profoundly studied and applied to the design of intrusion detection systems. In this paper, we present a novel wrapper feature selection approach based on augmented Whale Optimization Algorithm (WOA), which adopted in the context of IoT attacks detection and handles the high dimensionality of the problem. In our approach, we introduce the use of both V-shaped and S-shaped transfer functions into WOA and compare the superior variant with other well-known evolutionary optimizers. The experiments are conducted using NBaIoT dataset; wherein, five datasets were sampled from the original dataset. The dataset represents real IoT traffic, which is drawn from the UCI repository. The experimental results show that WOA based on V-shaped transfer function combined with elitist tournament binarization method is superior over S-shaped transfer function and outperforms other well regarded evolutionary optimizers based on the obtained average accuracy, fitness, number of features, running time and convergence curves. Hence, we can conclude that the proposed approach can be deployed in IoT intrusion detection systemsen_US
dc.language.isoenen_US
dc.publisherFuture Generation Computer Systemsen_US
dc.subjectInternet of things - Security measuresen_US
dc.subjectFeature selectionen_US
dc.subjectComputational intelligenceen_US
dc.subjectIntelligent control systemsen_US
dc.subjectWhale optimization algorithmen_US
dc.subjectAttacks detectionen_US
dc.subjectComputer securityen_US
dc.subjectClassificationen_US
dc.titleAugmented whale feature selection for IoT attacks: Structure, analysis and applicationsen_US
dc.typeArticleen_US
newfileds.departmentEngineering and Technologyen_US
newfileds.item-access-typeopen_accessen_US
newfileds.thesis-prognoneen_US
newfileds.general-subjectnoneen_US
dc.identifier.doi10.1016/j.future.2020.05.020-
item.languageiso639-1other-
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:Fulltext Publications
Files in This Item:
File Description SizeFormat
Augmented whale feature selection for IoT attacks Structure, analysis and applications.pdf937.09 kBAdobe PDFView/Open
Show simple item record

Page view(s)

7
checked on Jan 20, 2024

Download(s)

1
checked on Jan 20, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.